Top 25 IAM Providers in the Cybersecurity 500 List for Q3 2015

Cyber security research and market intelligence firm Cybersecurity Ventures has released the latest iteration of its Cybersecurity 500 list, a global compilation of innovative companies providing cyber security solutions and services.

The list, which is updated quarterly, aims at creating “awareness and recognition for the most innovative cyber security companies,” according to a press release announcing the Q3 2015 update.

 Unlike Gartner and Forrest reports, the Cybersecurity 500 list does not consider vendor revenue, employees, or annual growth in its rankings. “We do not think a list of the largest cyber security companies is useful to our target audience of cyber and IT security decision makers,” says Steve Morgan, founder and CEO of Cybersecurity Ventures, and Editor-in-Chief of the Cybersecurity 500 list. “[IT decision makers] already know who the biggest vendors are. Instead, we give a nod to the hottest and most innovative companies.”

Selection and ranking criteria are subjective and include some or all of the following when evaluating each company:

  • Cybersecurity Sector (market category)
  • Problem(s) solved
  • Customer Base
  • Feedback from CISOs and Decision Makers
  • Feedback from IT Security Evaluators & Recommenders
  • Feedback from VARs, SIs and Consultants
  • VC Funding
  • Company Growth
  • Published Product Reviews
  • Demos and Presentations at Conferences
  • Corporate Marketing and Branding
  • Media Coverage
  • Notable Implementations
  • Founder and Management Pedigree

We’ve combed through the list and pulled the 25 top-ranked identity and access management vendors. Businesses are listed according to rank in the Cybersecurity 500 list. Businesses listed in red text also feature on our IAM solutions directory, and in our free 2015 IAM Solutions Buyer’s Guide.

Priviledged Identity Management - Three Reasons

Complementary Whitepaper: Protecting Privileged Accounts from Abuse

  • Identify the advantages and risks of High-Privilege Access
  • Assure security compliance
  •  Learn to better manage privileged identities
#
Company Name
Cybersecurity Industry Sector
Corporate HQ
7 RSA Intelligence Driven Security Bedford, MA
8 IBM Enterprise IT Security Solutions Armonk, NY
25 SecuEra Technologies Identity & Access Management Solutions Washington DC
28 CyberArk Cyber Threat Protection Petach-Tikva, Israel
29 Splunk Big Data Security (SIEM) Cupertino CA
75 i-Sprint Identity & Access Management Chai Chee,Singapore
109 Xceedium Privileged Identity Management Herndon VA
137 Cryptovision Cryptography & Electronic Identity Gelsenkirchen,Germany
141 Courion Identity & Access Management Westborough MA
170 Centrify Unified Identity Management Santa Clara CA
181 TeleSign Mobile Identity Verification Marina Del Rey CA
189 Syntegrity Networks Identity Management & Data Security Fairfax VA
209 Okta Enterprise Identity Management San Francisco, CA
210 Ping Identity Identity & Access Managment Denver, CO
226 CA Technologies Enterprise IT Security New York City, NY
228 Mycroft Identity & Access Management New York City, NY
228 Mycroft Identity & Access Management New York City, NY
236 VU Security Identity Security & Fraud Prevention Buenos Aires, Argentina
239 Protected Networks Identity & Access Rights Management Berlin, Germany
242 Avatier Identity Management San Jose, CA
245 OneLogin Enterprise Identity Management San Francisco, CA
247 Radiant Logic Enterprise Identity Management Novato, CA
257 SailPoint Identity & Access Management Austin TX
286 Lieberman Software Privileged Identity Management Los Angeles, CA
300 GlobalSign Authentication & Identity Service Provider Portsmouth, NH

You can check out the Cybersecurity 500 list in full, with descriptions for each vendor, here.

For a detailed market overview of IAM solutions, check out our free 2015 IAM solutions Buyer’s Guide here.

Interested in learning more about Identity Management? Check out these additional resources: 

 

Follow Jeff

Jeff Edwards

Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff